CVE-2022-21959
Published on: 01/11/2022 12:00:00 AM UTC
Last Modified on: 05/23/2022 05:29:00 PM UTC
Certain versions of Windows 10 from Microsoft contain the following vulnerability:
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21892, CVE-2022-21928, CVE-2022-21958, CVE-2022-21960, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963.
- CVE-2022-21959 has been assigned by
secur[email protected] to track the vulnerability - currently rated as MEDIUM severity.
CVSS3 Score: 6.8 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
PHYSICAL | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | HIGH |
CVSS2 Score: 7.2 - HIGH
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
LOCAL | LOW | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
COMPLETE | COMPLETE | COMPLETE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Security Update Guide - Microsoft Security Response Center | portal.msrc.microsoft.com text/html |
![]() |
Related QID Numbers
- 91851 Microsoft Windows Security Update for January 2022
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Operating System | Microsoft | Windows 10 | - | All | All | All |
Operating System | Microsoft | Windows 10 | - | All | All | All |
Operating System | Microsoft | Windows 10 | 1607 | All | All | All |
Operating System | Microsoft | Windows 10 | 1607 | All | All | All |
Operating System | Microsoft | Windows 10 | 1809 | All | All | All |
Operating System | Microsoft | Windows 10 | 1809 | All | All | All |
Operating System | Microsoft | Windows 10 | 1809 | All | All | All |
Operating System | Microsoft | Windows 10 | 1909 | All | All | All |
Operating System | Microsoft | Windows 10 | 1909 | All | All | All |
Operating System | Microsoft | Windows 10 | 1909 | All | All | All |
Operating System | Microsoft | Windows 10 | 20h2 | All | All | All |
Operating System | Microsoft | Windows 10 | 20h2 | All | All | All |
Operating System | Microsoft | Windows 10 | 20h2 | All | All | All |
Operating System | Microsoft | Windows 10 | 21h1 | All | All | All |
Operating System | Microsoft | Windows 10 | 21h1 | All | All | All |
Operating System | Microsoft | Windows 10 | 21h1 | All | All | All |
Operating System | Microsoft | Windows 10 | 21h2 | All | All | All |
Operating System | Microsoft | Windows 10 | 21h2 | All | All | All |
Operating System | Microsoft | Windows 10 | 21h2 | All | All | All |
Operating System | Microsoft | Windows 11 | - | All | All | All |
Operating System | Microsoft | Windows 11 | - | All | All | All |
Operating System | Microsoft | Windows 8.1 | - | All | All | All |
Operating System | Microsoft | Windows Rt 8.1 | - | All | All | All |
Operating System | Microsoft | Windows Server | 2022 | All | All | All |
Operating System | Microsoft | Windows Server | 20h2 | All | All | All |
Operating System | Microsoft | Windows Server 2012 | - | All | All | All |
Operating System | Microsoft | Windows Server 2012 | r2 | All | All | All |
Operating System | Microsoft | Windows Server 2016 | - | All | All | All |
Operating System | Microsoft | Windows Server 2019 | - | All | All | All |
- cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*:
- cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*:
- cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*:
- cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*:
- cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*:
- cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*:
- cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*:
- cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*:
- cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*:
- cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*:
- cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*:
- cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*:
- cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*:
- cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*:
- cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*:
- cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*:
- cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*:
- cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*:
- cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*:
- cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*:
- cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*:
- cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:-:*:*:*:
- cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*:
- cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*:
- cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*:
- cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*:
- cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*:
- cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*:
- cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2022-21959 | 2022-01-11 21:39:05 |